ICICS 2023
The 25th International Conference on Information and Communications Security
18-20 November, 2023, Nankai University, Tianjin, China
Technical Program Committee (TPC)
Members
- Willy Susilo, University of Wollongong
- Shuai Wang, Hong Kong University of Science and Technology
- Catalin Dragan, University of Surrey
- Joaquin Garcia-Alfaro, Institut Polytechnique de Paris
- Stefanos Gritzalis, University of Piraeus
- Sokratis Katsikas, Norwegian University of Science and Technology
- Giovanni Livraga, University of Milan
- Christian Mainka, Ruhr University Bochum
- Daisuke Mashima, Advanced Digital Sciences Center
- Siaw-Lynn Ng, Royal Holloway, University of London
- Satoshi Obana, Hosei University
- Rolf Oppliger, eSECURITY Technologies
- Günther Pernul, University of Regensburg
- Joachim Posegga, University of Passau
- Giovanni Russello, University of Auckland
- Vishal Sharma, Queen's University Belfast
- Elizabeth Quaglia, Royal Holloway, University of London
- Ashok Kumar Das, Indian Institute of Technology Kharagpur
- Bo Luo, University of Kansas
- Bo Qin, Renming University
- Chao Shen, Xi'an Jiaotong University
- Chun Guo, Shandong University
- David A. Mohaisen, University of Central Florida
- Debiao He, Wuhan University
- Debin Gao, Singapore Management University
- Dieter Gollmann, Hamburg University of Technology
- Dimitrios Papadopoulos, HKUST
- Ding Wang, Nankai University
- Fangguo Zhang, Sun Yat-sen University
- Faysal Hossain Shezan, University of Virginia
- Fei Gao, Beijing University of Posts and Telecommunications
- Feng Hao, University of Warwick
- Feng Lin, Zhejiang University
- Fengwei Zhang, Southern University of Science and Technology
- Fuchun Guo, University of Wollongong
- Haibin Zhang, Beijing Institute of Technology
- Huaxiong Wang, Nanyang Technological University
- Hongxin Hu, State University of New York at Buffalo
- Hung-Min Sun, National Tsing Hua University
- Hyoungshick Kim, Sungkyunkwan University
- Jiaxin Pan, Norwegian University of Science and Technology
- Jianbing Ni, Queen's University
- Jianfeng Wang, Xidian University
- Jianting Ning, Fujian Normal University
- Jingqiang Lin, University of Science and Technology of China
- Jingwei Li, University of Electronic Science and Technology of China
- Jinsong Han, Zhejiang University
- Jin Wook Byun, Pyeongtaek University
- Juanru Li, Shanghai Jiao Tong University
- Junzuo Lai, Jinan University
- Kaitai Liang, Delft University of Technology
- Kangjie Lu, University of Minnesota
- Kun Sun, George Mason University
- Kuo-Hui Yeh, National Dong Hwa University
- Lei Wang, Shanghai Jiao Tong University
- Lei Zhang, East China Normal University
- Lingyu Wang, Concordia University
- Long Cheng, Clemson university
- Longjiang Qu, National University of Defense Technology
- Marko Hölbl, University of Maribor, Maribor, Slovenia
- Mauro Conti, University of Padua
- Meng Shen, Beijing Institute of Technology
- Muhammad Khurram Khan, King Saud University
- Nitesh Saxena, Texas A&M University
- Peng Xu, Huazhong University of Science and Technology
- Qianhong Wu, Beihang University
- Qi Li, Tsinghua University
- Qingchuan Zhao, City University of Hong Kong
- Qingni Shen, Peking University
- Roberto Di Pietro, Hamad Bin Khalifa University
- Rongmao Chen, National University of Defense Technology
- Rongxing Lu, University of New Brunswick
- Sherman S. M. Chow, Chinese University of Hong Kong
- Shi-Feng Sun, Shanghai jiao Tong University, China
- Shujun Li, University of Kent
- Shuqin Fan, State Key Laboratory of Cryptology
- Tianren Liu, Peking University
- Tianwei Zhang, Amazon Web Services
- Ting Chen, University of Electronic Science and Technology of China
- Odelu Vanga, Indian Institute of Information Technology Chittoor
- Weili Han, Fudan University
- Wei Wang, Beijing Jiaotong University
- Xiaofeng Chen, Xidian University
- Xiapu Luo, Hong Kong Polytechnic University
- Ximeng Liu, Fuzhou University
- Xun Yi, RMIT University
- Yang Zhang, CISPA
- Yi Deng, State Key Laboratory of Information Security
- Yongbin Zhou, Nanjing University of Science and Technology
- Yong Guan, Iowa State University
- Yong Yu, Shaanxi Normal University
- Yuan Zhang, Fudan University
- Yuan Zhang, University of Electronic Science and Technology of China
- Yunkai Zou, Nankai University
- Yu Yu, Shanghai Jiao Tong University
- Zhen Ling, Southeast University
- Zhibo Wang, Zhejiang University
- Zhikun Zhang, Stanford University
- Chen Wang, Huazhong University of Science and Technology
- Yan Jia, Nankai University
- Ziming Zhao, University at Buffalo
- Weizhi Meng, Technical Universtiy of Denmark
- Meicheng Liu, Institute of Information Engineering, Chinese Academy of Sciences
- Siwei Sun, University of Chinese Academy of Sciences
- Ming Li, The University of Texas at Arlington
- Mingwu Zhang, Hubei University of Technology
- Ling Song, Jinan University, China
- Haoyu Ma, Zhejiang Lab
- Jiang Zhang, State Key Laboratory of Cryptology, China
- Zhicong Huang, Alibaba
- Guomin Yang, Singapore Management University
- Siqi Ma, The University of New South Wales, Australia
- Cristian Mainka, Horst Görtz Institute, Ruhr University Bochum
- Chunhua Su, University of Aizu, Japan
- Chao Zhang, Tsinghua University
- Michael Scott, MIRACL Labs, Ireland
- Xiaoyu Ji, Zhejiang University
- Wenhao Wang, State Key Laboratory of Information Security, China
- Jian Liu, University of Tennessee, Knoxville
- Boyang Wang, University of Cincinnati
- Constantin Catalin Dragan, University of Surrey
- Jian Shen, Nanjing University of Information Science and Technology
- Toshihire Yamauchi, Okayama University
- Yuanyuan Zhang, Shanghai Jiaotong University, China
- Daoyuan Wu, The Chinese University of Hong Kong
- Peng Gao, Virginia Tech